{"id":31504,"date":"2017-04-26T13:06:48","date_gmt":"2017-04-26T03:06:48","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=31504"},"modified":"2017-04-26T14:23:02","modified_gmt":"2017-04-26T04:23:02","slug":"cyber-wrap-161","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/cyber-wrap-161\/","title":{"rendered":"Cyber wrap"},"content":{"rendered":"
<\/figure>\n

A flurry of activity on the cyber-policy front has accompanied the one year anniversary of Australia\u2019s Cyber Security Strategy<\/em><\/a>, which was launched by Prime Minister Malcolm Turnbull on 21 April 2016.<\/p>\n

The Australian Cyber Security Growth Network<\/a>, the industry-led, not-for-profit company tasked with boosting Australia\u2019s cyber industry, released its first Cyber Security Sector Competitiveness Plan<\/em><\/a> in Sydney last Thursday. The report, developed in conjunction with AlphaBeta<\/a> is intended to help Australia\u2019s cybersecurity industry \u2018reach its full potential<\/a>\u2019 by identifying and overcoming<\/a> roadblocks to small business, commercialisation of research and a cyber skilled workforce.<\/p>\n

The Minister Assisting the Prime Minister on Cyber Security, Dan Tehan, recently launched the ASX100 Cyber Health Check Report<\/em><\/a>, another key deliverable of the Cyber Security Strategy. The report, which reveals how Australia\u2019s biggest businesses approach cybersecurity, was developed<\/a> by Australian Securities Exchange, the Australian Securities and Investments Commission, the Department of the Prime Minister and Cabinet, Deloitte, EY, KPMG and PwC. One of the report\u2019s many findings<\/a> is that only 11% of companies have a clear idea of what data is shared with third parties, or have initiatives designed to reassure investors and customers of their cybersecurity.<\/p>\n

The Minister\u2019s been busy, also publishing an op-ed<\/a> calling for a \u2018step change\u2019 from passive to \u2018active cyberdefence\u2019 to combat cybercrime in Australia. The article advocates<\/a> for telcos and ISPs to take more responsibility for the dangerous content they inadvertently propagate and that users should be able to opt into services that provide a filtered and more secure version of the internet. While the Minister assured readers that he knows that \u2018laws must be respected\u2019, he said the government will \u2018investigate existing legislation and, where appropriate, remove any roadblocks\u2019 that may prevent this type of active defence from being possible. The controversial article has been described as a \u2018radical plan\u2019<\/a> and has been criticised<\/a> for its poor understanding of the existing services and limited powers of telcos.<\/p>\n

Australia took some strides on the international cyber stage this week when it hosted the inaugural Australia\u2013China High-Level Security Dialogue<\/a> in the wake of Premier Li Keqiang\u2019s March visit<\/a>. At the meeting Prime Minister Turnbull, Foreign Minister Julie Bishop and Secretary of the Chinese Communist Party\u2019s Central Commission for Political and Legal Affairs Meng Jianzhu reached the significant agreement<\/a> that \u2018neither country would conduct or support cyber-enabled theft of intellectual property, trade secrets or confidential business information with the intent of obtaining competitive advantage\u2019. The pact reflects the principle of the September 2015 agreement between China and the US<\/a>, which reportedly correlated with a decrease<\/a> of Chinese commercial espionage. Fingers crossed for similar success Down Under.<\/p>\n

Stateside, the CIA and FBI<\/a> have launched a joint investigation to identify those responsible for leaking the contents of the Wikileaks\u2019 multi-tranche \u2018Vault 7\u2019<\/a> disclosures. Wikileaks has claimed that the documents, purporting to detail CIA cyber tools for hacking smartphones, televisions and computer systems, come from a former US intelligence contractor<\/a>. Unsurprisingly, the CIA is staying tight-lipped on the investigation into the source of the leak.<\/p>\n

Looking at the date, it appears that the Trump administration\u2019s much-anticipated cybersecurity plan is now officially late<\/a>. As President-elect, Trump promised<\/a> to deliver a fresh federal cyber plan \u2018within 90 days of taking office\u2019. We\u2019re now past 90 days and the administration still has nothing to show other than a false start<\/a> and two leaked<\/a> drafts<\/a>. Unsurprisingly, assurances have surfaced<\/a> that Trump will sign a version of the long-awaited Executive Order this week, but we won\u2019t be holding our breath.<\/p>\n

French presidential candidate Emmanuel Macron appears to have been targeted<\/a> by the same Russian operatives behind the 2016 hack of the Democratic National Committee (DNC). A series<\/a> of phishing attempts and web assaults sought to obtain the email passwords of individuals working on the Macron campaign and gain access to confidential correspondence. New research by cybersecurity firm Trend Micro has compared<\/a>\u00a0the digital fingerprints on the\u00a0Macron system to\u00a0those found after the DNC hack, finding that they were also from APT28\u2014though the research stops short of saying who\u2019s behind the malicious group. Not that they needed to, with US intelligence agencies having already explicitly attributed<\/a> the work of APT28 to Russian intelligence services. While the efforts against the Macron campaign were reportedly unsuccessful, Macron\u2019s digital director Mounir Mahjoubi noted<\/a> \u2018there was talent behind it and time went into it: talent, money experience, time and will\u2019.<\/p>\n

And finally, in a development unlikely to boost international confidence in democratic security, a Russian government think tank reportedly<\/a> outlined a plan to influence the US election in June 2016. US officials have anonymously disclosed that the US government is in possession of a Russian strategy paper written by the Russian Institute for Strategic Studies<\/a> and circulated to the highest levels of the Russian government last year. Hold on to your votes, people!<\/p>\n","protected":false},"excerpt":{"rendered":"

A flurry of activity on the cyber-policy front has accompanied the one year anniversary of Australia\u2019s Cyber Security Strategy, which was launched by Prime Minister Malcolm Turnbull on 21 April 2016. The Australian Cyber Security …<\/p>\n","protected":false},"author":390,"featured_media":31514,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[531],"tags":[391,169,1597,83,728],"class_list":["post-31504","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-2","tag-cyber","tag-cyber-crime","tag-cyber-strategy","tag-elections","tag-hacking"],"acf":[],"yoast_head":"\nCyber wrap | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-161\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber wrap | The Strategist\" \/>\n<meta property=\"og:description\" content=\"A flurry of activity on the cyber-policy front has accompanied the one year anniversary of Australia\u2019s Cyber Security Strategy, which was launched by Prime Minister Malcolm Turnbull on 21 April 2016. The Australian Cyber Security ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/cyber-wrap-161\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2017-04-26T03:06:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-04-26T04:23:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/04\/5299934886_75a29a5a26_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"426\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Zoe Hawkins\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Zoe Hawkins\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-161\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/04\/5299934886_75a29a5a26_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/04\/5299934886_75a29a5a26_z.jpg\",\"width\":640,\"height\":426},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-161\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-161\/\",\"name\":\"Cyber wrap | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-161\/#primaryimage\"},\"datePublished\":\"2017-04-26T03:06:48+00:00\",\"dateModified\":\"2017-04-26T04:23:02+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-161\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/cyber-wrap-161\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/cyber-wrap-161\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber wrap\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701\",\"name\":\"Zoe Hawkins\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g\",\"caption\":\"Zoe Hawkins\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/zoe-hawkins\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber wrap | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/cyber-wrap-161\/","og_locale":"en_US","og_type":"article","og_title":"Cyber wrap | The Strategist","og_description":"A flurry of activity on the cyber-policy front has accompanied the one year anniversary of Australia\u2019s Cyber Security Strategy, which was launched by Prime Minister Malcolm Turnbull on 21 April 2016. The Australian Cyber Security ...","og_url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-161\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2017-04-26T03:06:48+00:00","article_modified_time":"2017-04-26T04:23:02+00:00","og_image":[{"width":640,"height":426,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/04\/5299934886_75a29a5a26_z.jpg","type":"image\/jpeg"}],"author":"Zoe Hawkins","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Zoe Hawkins","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-161\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/04\/5299934886_75a29a5a26_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2017\/04\/5299934886_75a29a5a26_z.jpg","width":640,"height":426},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-161\/","url":"https:\/\/www.aspistrategist.ru\/cyber-wrap-161\/","name":"Cyber wrap | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-161\/#primaryimage"},"datePublished":"2017-04-26T03:06:48+00:00","dateModified":"2017-04-26T04:23:02+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-161\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/cyber-wrap-161\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/cyber-wrap-161\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Cyber wrap"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/3c83e374221e7d4e6ccdabb43f9a1701","name":"Zoe Hawkins","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4e7cfaeb94c847b758be1d5c1c2f346?s=96&d=mm&r=g","caption":"Zoe Hawkins"},"url":"https:\/\/www.aspistrategist.ru\/author\/zoe-hawkins\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/31504"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/390"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=31504"}],"version-history":[{"count":8,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/31504\/revisions"}],"predecessor-version":[{"id":31521,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/31504\/revisions\/31521"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/31514"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=31504"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=31504"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=31504"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}